CVE-2018-16841

Source
https://cve.org/CVERecord?id=CVE-2018-16841
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16841.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2018-16841
Downstream
Related
Published
2018-11-28T14:29:00.347Z
Modified
2026-03-15T22:19:41.752032Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

Samba from version 4.3.0 and before versions 4.7.12, 4.8.7 and 4.9.3 are vulnerable to a denial of service. When configured to accept smart-card authentication, Samba's KDC will call tallocfree() twice on the same memory if the principal in a validly signed certificate does not match the principal in the AS-REQ. This is only possible after authentication with a trusted certificate. talloc is robust against further corruption from a double-free with tallocfree() and directly calls abort(), terminating the KDC process.

References

Affected packages

Git / github.com/samba-team/samba

Affected ranges

Type
GIT
Repo
https://github.com/samba-team/samba
Events
Database specific
{
    "versions": [
        {
            "introduced": "4.3.0"
        },
        {
            "fixed": "4.7.12"
        },
        {
            "introduced": "4.8.0"
        },
        {
            "fixed": "4.8.7"
        },
        {
            "introduced": "4.9.0"
        },
        {
            "fixed": "4.9.3"
        }
    ]
}

Affected versions

ldb-1.*
ldb-1.3.3
ldb-1.3.4
ldb-1.3.5
ldb-1.3.6
ldb-1.4.3
samba-4.*
samba-4.8.0
samba-4.8.1
samba-4.8.2
samba-4.8.3
samba-4.8.4
samba-4.8.5
samba-4.8.6
samba-4.9.0
samba-4.9.1
samba-4.9.2

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2018-16841.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "12.04"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "14.04"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "16.04"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "18.04"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "18.10"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "9.0"
            }
        ]
    }
]